A Cryptographic Compendium - John Savard
A book about cryptography with information about a large number of cipher systems and a limited coverage of cryptanalysis. It is mostly concerned with the various kinds of ciphers people have used and only mentions a few things about breaking ciphers.
more>>

42eXplore - Annette Lamb and Larry Johnson
Web projects that offer definitions, activities, four good starting points, and many more links and resources for thematic topics such as charts and graphs; codes, ciphers and secret messages; fractals, tessellations, geometric shapes, and figures; number
...more>>

The Alan Turing Home Page - Andrew Hodges
A gateway and guide to a large site dedicated to Alan Turing (1912-1954); 25 pages of biographical information on this computer scientist, mathematician, and cryptographer, from the author of Alan Turing: the Enigma.
...more>>

Alphametics - Mike Keith
Alphametics (also known as alphametrics) are puzzles that combine mathematical and word play, the first modern example of which was Dudeney's SEND + MORE = MONEY. From the "alphamenu," choose traditional alphametics, the doubly-true genre, new literary
...more>>

Alphametics - Torsten Sillke
Cryptarithms are puzzles in which letters or symbols are substituted for the digits in an arithmetical calculation. If a cryptarithm uses letters in place of digits, and the letters form words or phrases, the puzzle is an alphametic. J. A. H. Hunter coined
...more>>

Bletchley Park - The Bletchley Park Trust
Also known as Station X, Bletchley Park is the home of the United Kingdom's Government Code and Cipher School (GC&CS). Read about its history, including decrypting the German Enigma code, Alan Turing's contribution of the "Bombe," and the various huts
...more>>

Can You Crack the Enigma Code? - Richard Belfield
The official website accompanying Belfield's book, Can You Crack the Enigma Code? "As part of the book, Richard invited a team of experts from the Information Security Group at Royal Holloway, University of London, to create a challenging collection of
...more>>

Challenges - RSA Security
Read about three cryptographic challenges: RSA Factoring Challenge, Secret-Key Challenge, and DES Challenge III. For the solution of these cryptographic challenges, RSA offers cash prizes as "... modest rewards for some of the hard work that goes into
...more>>

Cracking a Medieval Code - Ivars Peterson (MathTrek)
The first printed book on cryptology was written by Johannes Trithemius (1462-1516), an abbot in Spanheim, Germany, who was one of the leading intellectuals of his day. Bearing the title Polygraphiae libri sex ("Six Books of Polygraphy"), it was published
...more>>

Cryptarithmetic Puzzle Solver - Naoyuki Tamura
Enter a cryptarithm or select an example, such as SEND + MORE = MONEY. Also, puzzle generators based on themes such as color names, fruits, vegetables, and numeral words in English, French, German, Spanish, and Italian.
...more>>

Cryptarithms Online - Jorge Soares
Mathematical puzzles in which the digits are replaced by letters of the alphabet or other symbols. Brain-teasers by the author; cryptarithms from the journal Sphinx; a primer; books on cryptarithms, and links to relevant sites on the Web.
...more>>

Cryptoclub - Vera Pless, Janet Beissinger
This website includes tools to encrypt and decrypt messages, an
animated treasure hunt, a classroom message board to send and
receive encrypted messages, and a place to explore mathematics
topics related to cryptography, such as prime numbers and
...more>>

Cryptography - Corey Reed
An introduction to cryptography, in particular affine enciphering applied to the alphabet, focusing on the use of linear algebra. Includes a primer on bases and modulus algebra and extensions for deciphering an affine enciphered message, using keys to
...more>>

CS22: Discrete Math - Brown University
An introduction to discrete math with a focus on proof, logic, proof by induction, cryptography and networks of processors: lessons, homework, solutions, and information. "Discrete mathematics" refers to the distinction between discrete sets (for example,
...more>>

David Bruce Wilson
David Bruce Wilson researches probability, combinatorics, and theoretical computer science. Abstracts of his articles on these subjects are available on the web and may be downloaded in PostScript or .dvi formats. Software available for download includes
...more>>

David Sumner's Home Page - David Sumner
Study guides, exams, quizzes, problem sets, exam review materials, utilities, programs and simulations, syllabi, and other materials for courses such as calculus, sequences and series, graph theory, number theory and cryptography, and probability. The
...more>>

ECC Tutorial - Certicom
Elliptic Curve Cryptosystem Classroom introduces elliptic curves and how they are used to create a secure and powerful cryptosystem: elliptic curve groups over real numbers, over Fp, over F2m, and the discrete log problem. Certicom's 109-bit and other
...more>>

The Enigma Machine - Russell Schwager
This Java applet simulates the operation of an Enigma machine, based on the one used by the Germans in World War II to encrypt military messages. With information on the history and workings of the mechanical Enigma machine; a brief description of how
...more>>

A Few Aspects of Cryptology - David Hamer
Read about cipher machines such as Enigma, Geheimschreiber, NEMA, SIGABA and others; visit the gallery showrooms of the Crypto Simulation Group (CSG), a group of historians and researchers in the field of cryptology; download sample simulators and published
...more>>

Hiding in DNA - Ivars Peterson (MathTrek)
Spies might have to start boning up on molecular biology to pass along and decipher secret messages. During World War II, German spies used microdots to hide information in plain view. Consisting of a greatly reduced photograph of a typed page, a microdot
...more>>

Homepage of Torsten Sillke - Torsten Sillke
A collection of puzzles statements, with references, on a variety of topics: operations research, such as crossing the bridge; logic, including liars and truth tellers, mastermind, and age problems; lateral thinking, also known as "situation puzzles";
...more>>

Jeffrey C. Lagarias
A member of the University of Michigan Department of Mathematics. List of publications, with many available for download in PostScript format; Lagarias' research interests include Number Theory, also Computational Complexity Theory, Cryptography, Discrete
...more>>

Ken Shirriff
A researcher at Sun Microsystems. Annotated bibliographies on fractals and cryptography, and related papers, which may be downloaded in PostScript format. Graphics of Voronoi fractals (dividing the plane into regions closest to a given point) and fractals
...more>>

"Kryptos" - Central Intelligence Agency (CIA)
This page showcases the history and mystery of "Kryptos," a sculpture at the CIA by artist James Sanborn. See the Flash video introduction, and learn more about the sculpture, the code, and the artist. Text-only version available.
...more>>

Lava Lamp Randomness - Ivars Peterson (MathTrek)
Researchers have come up with a novel application of the mesmerizing movements of the lava lamp's globules. They use them as the starting point for generating a sequence of random numbers. Called lavarand, the random-number generator is the tongue-in-cheek
...more>>

License Codes - Ivars Peterson (MathTrek)
Some states use complicated schemes for establishing driver's license identification numbers. The numbers may include check digits to detect errors or fraud, or they may encode such personal data as the month and date of birth, year of birth, and sex.
...more>>

Math Alive - Ingrid Daubechies, Princeton University
Materials from a course designed for those who have not had college mathematics but would like to understand some of the mathematical concepts behind important modern applications. Interactive "virtual labs" address cryptography; error correction and
...more>>